forked from Qortal/Brooklyn
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
35 lines
982 B
C
35 lines
982 B
C
/*
|
|
* linux/include/linux/parser.h
|
|
*
|
|
* Header for lib/parser.c
|
|
* Intended use of these functions is parsing filesystem argument lists,
|
|
* but could potentially be used anywhere else that simple option=arg
|
|
* parsing is required.
|
|
*/
|
|
|
|
|
|
/* associates an integer enumerator with a pattern string. */
|
|
struct match_token {
|
|
int token;
|
|
const char *pattern;
|
|
};
|
|
|
|
typedef struct match_token match_table_t[];
|
|
|
|
/* Maximum number of arguments that match_token will find in a pattern */
|
|
enum {MAX_OPT_ARGS = 3};
|
|
|
|
/* Describe the location within a string of a substring */
|
|
typedef struct {
|
|
char *from;
|
|
char *to;
|
|
} substring_t;
|
|
|
|
int match_token(char *, const match_table_t table, substring_t args[]);
|
|
int match_int(substring_t *, int *result);
|
|
int match_octal(substring_t *, int *result);
|
|
int match_hex(substring_t *, int *result);
|
|
bool match_wildcard(const char *pattern, const char *str);
|
|
size_t match_strlcpy(char *, const substring_t *, size_t);
|
|
char *match_strdup(const substring_t *);
|